Win8/Linux Dual-Boot Windows 8 and Linux in dual-boot modeNov 26, 2012
Although getting Windows to play nice with an existing Linux installation is difficult, with a few tricks, you can set up Windows 8 to dual-boot with Linux.more »
Linux Filesystems on Windows 8 Using Linux filesystems on Windows 8Nov 26, 2012
For years, Windows has stubbornly refused to support any filesystems apart from its own, but with a few tricks, you can make your Windows systems talk to the Linux ext filesystem.more »
Git 101 Not just for source code – Versioning with GitNov 26, 2012
When several people collaborate on source code or documents, things can get messy fast. Git provides a quick cure: The distributed versioning system reliably ensures the integrity and consistency of data with minimal effort.more »
Windows 8 and Samba Windows 8 and Linux on the networkNov 26, 2012
Samba configuration often fails when users overlook little things. We show you how to configure a Linux system for file sharing on a Windows 8 peer-to-peer network.more »
Ask Klaus! Klaus Knopper answers your Linux questionsNov 26, 2012
Klaus Knopper is the creator of Knoppix and co-founder of LinuxTag expo. He currently works as a teacher, programmer, and consultant. If you have a configuration problem, or if you just want to learn more about how Linux works, send your questions to: firstname.lastname@example.org »
Oracle creates a new Git repository for tracking Linux kernel changes.more »
136 million Android units shipped, making up 75% of the market.more »
Table of Contents: 145 What's inside the December 2012 issueOct 26, 2012
Building a botnet doesn’t necessarily make you an outlaw; we show you how one programmer automated a timesensitive business application with a botnet. Next, get ready to hit the ground running with HTML5, and secure your websites with sound PHP programming principles.more »
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems